unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Cybersecurity Snapshot: Prompt Injection and Data Disclosure Top OWASP’s List of Cyber Risks for GenAI LLM Apps
Don’t miss OWASP’s update to its “Top 10 Risks for LLMs” list. Plus, the ranking of the most harmful...
2024-11-22 22:0:0 | 阅读: 1 |
收藏
|
Tenable Blog - www.tenable.com
security
software
water
ransomware
Active Directory Under Attack: Five Eyes Guidance Targets Crucial Security Gaps
A landmark global report from cybersecurity agencies emphasizes 17 attack techniques against Microso...
2024-11-22 00:38:0 | 阅读: 1 |
收藏
|
Tenable Blog - www.tenable.com
security
attackers
monitoring
ensuring
Five Cyber Agencies Sound Alarm About Active Directory Attacks: Beyond the Basics
2024-11-22 00:36:0 | 阅读: 1 |
收藏
|
Tenable Blog - www.tenable.com
tenable
cloud
security
nessus
attackers
Volt Typhoon: What State and Local Government Officials Need to Know
2024-11-19 22:1:0 | 阅读: 0 |
收藏
|
Tenable Blog - www.tenable.com
tenable
security
cloud
nessus
volt
Volt Typhoon: U.S. Critical Infrastructure Targeted by State-Sponsored Actors
Volt Typhoon, a state-sponsored actor linked to the People’s Republic of China, has consistently tar...
2024-11-19 22:0:0 | 阅读: 1 |
收藏
|
Tenable Blog - www.tenable.com
typhoon
volt
tenable
security
CVE-2024-0012, CVE-2024-9474: Zero-Day Vulnerabilities in Palo Alto PAN-OS Exploited In The Wild
2024-11-19 03:22:2 | 阅读: 13 |
收藏
|
Tenable Blog - www.tenable.com
tenable
cloud
nessus
pan
security
New AWS Control Policy on the Block
AWS has released an important new feature that allows you to apply permission boundaries around reso...
2024-11-19 02:0:0 | 阅读: 3 |
收藏
|
Tenable Blog - www.tenable.com
rcps
security
rcp
cloud
scps
The Dark Side of Domain-Specific Languages: Uncovering New Attack Techniques in OPA and Terraform
Check out our deep dive into both new and known techniques for abusing infrastructure-as-code and po...
2024-11-18 22:0:0 | 阅读: 0 |
收藏
|
Tenable Blog - www.tenable.com
opa
cloud
malicious
attacker
security
Cybersecurity Snapshot: Five Eyes Rank 2023’s Most Frequently Exploited CVEs, While CSA Publishes Framework for AI System Audits
Check out the CVEs attackers targeted the most last year, along with mitigation tips. Plus, a new gu...
2024-11-15 22:0:0 | 阅读: 9 |
收藏
|
Tenable Blog - www.tenable.com
security
cloud
benchmarks
smbs
software
Who’s Afraid of a Toxic Cloud Trilogy?
The Tenable Cloud Risk Report 2024 reveals that nearly four in 10 organizations have workloads that...
2024-11-15 01:19:0 | 阅读: 5 |
收藏
|
Tenable Blog - www.tenable.com
cloud
toxic
security
trilogy
Microsoft’s November 2024 Patch Tuesday Addresses 87 CVEs (CVE-2024-43451, CVE-2024-49039)
2024-11-13 03:2:10 | 阅读: 32 |
收藏
|
Tenable Blog - www.tenable.com
tenable
remote
client
microsoft
Cybersecurity Snapshot: CISA Warns of Global Spear-Phishing Threat, While OWASP Releases AI Security Resources
2024-11-8 22:0:0 | 阅读: 4 |
收藏
|
Tenable Blog - www.tenable.com
tenable
security
ransomware
cloud
nessus
Context Is King: From Vulnerability Management to Exposure Management
VM remains a cornerstone of preventive cybersecurity, but organizations still struggle with vulnerab...
2024-11-7 21:30:0 | 阅读: 0 |
收藏
|
Tenable Blog - www.tenable.com
exposure
asset
signals
security
tenable
Securing Financial Data in the Cloud: How Tenable Can Help
2024-11-4 22:0:0 | 阅读: 3 |
收藏
|
Tenable Blog - www.tenable.com
tenable
security
cloud
nessus
lumin
Cybersecurity Snapshot: Apply Zero Trust to Critical Infrastructure’s OT/ICS, CSA Advises, as Five Eyes Spotlight Tech Startups’ Security
Should critical infrastructure orgs boost OT/ICS systems’ security with zero trust? Absolutely, the...
2024-11-1 21:0:0 | 阅读: 2 |
收藏
|
Tenable Blog - www.tenable.com
security
cisos
innovation
FY 2024 State and Local Cybersecurity Grant Program Adds CISA KEV as a Performance Measure
2024-10-31 21:0:0 | 阅读: 4 |
收藏
|
Tenable Blog - www.tenable.com
tenable
security
cloud
nessus
Cybersecurity Snapshot: New Guides Offer Best Practices for Preventing Shadow AI and for Deploying Secure Software Updates
Looking for help with shadow AI? Want to boost your software updates’ safety? New publications offer...
2024-10-25 21:0:0 | 阅读: 2 |
收藏
|
Tenable Blog - www.tenable.com
software
security
shadow
resilience
How To Protect Your Cloud Environments and Prevent Data Breaches
2024-10-24 21:0:0 | 阅读: 0 |
收藏
|
Tenable Blog - www.tenable.com
tenable
cloud
security
nessus
lumin
CVE-2024-47575: Frequently Asked Questions About FortiJump Zero-Day in FortiManager and FortiManager Cloud
2024-10-24 04:37:56 | 阅读: 20 |
收藏
|
Tenable Blog - www.tenable.com
tenable
cloud
security
nessus
From Bugs to Breaches: 25 Significant CVEs As MITRE CVE Turns 25
2024-10-22 23:11:11 | 阅读: 4 |
收藏
|
Tenable Blog - www.tenable.com
tenable
security
remote
cloud
Previous
-9
-8
-7
-6
-5
-4
-3
-2
Next